A wide range of articles, videos and interviews concerning persistent and current threats that organisations face.

Hacking How the hackers are using Open Source Libraries to their advantage

Ben Porter, Chief Product Officer at Instaclustr, writes about how the potential of Open Source Libraries must be balanced with …

Elections Why the cyber security ratings of U.S. presidential contenders matter

Paul Gagliardi, head of threat intelligence and CISO at SecurityScorecard, investigates how secure the U.S. presidential campaigns actually are and …

Surveillance Do we – the public – have a voice in the facial recognition debate?

Stephanie Hare, Author of Technology Ethics, highlights that it's difficult to know how our data is being captured, used for …

Fake news BEWARE of fake news & fraud amidst COVID-19 outbreak

As confusion over the coronavirus continues, fake news and fraud is rife: from text messages claiming to be from an …

Risk management The risks of remote working: threats to watch out for

Andrew Tsonchev, Director of Technology at Darktrace outlines the most serious threats that security teams will face over the coming …

Vulnerability What can the Citrix bug teach us about patch management and disclosure protocols?

Oliver Pinson-Roxburgh, co-founder of Bulletproof, explains what lessons should be drawn from how CVE-2019-19781's story unfolded earlier this year, and …

Phishing The COVID-19 scamming tricks to avoid!

So the scammers are taking advantage of the COVID-19 pandemic. But, of course. As reported on Sky News, experts from …

Mobile security All endpoints are equal, but are mobile endpoints being treated the same way with...

Jamie Andrews, EMEA Partner Director at Lookout, outlines the most popular tactics used by hackers to target individuals on their …

Information Security Coronavirus panic! 10 steps to consider for securing your organisation while employees work remotely

Sachin Nayyar, CEO, Securonix, has devised a helpful list of ideas for organisations to keep themselves secure amidst the coronavirus …

Social media Security at work – should you ban social media in your company?

As a CISO, should you impose a ban on social media in your organisation in the name of security? If …

Insider threat The art of the modern con: How to build a victim’s trust

What to do when senior employees go rogue? Thom Langford, Founder, TL(2) Security and Christian Toon, CISO, Pinsent Masons, discuss …

Phishing Phishing attacks are on the rise – but is employee awareness following suit?

Sponsored by Proofpoint
Email remains the number-one threat vector used by cybercriminals. Threat actors continue to use email-based attacks to target people within …